A new security model to prevent denial‐of‐service attacks and violation of availability in wireless networks
- 19 July 2011
- journal article
- research article
- Published by Wiley in International Journal of Communication Systems
- Vol. 25 (7), 903-925
- https://doi.org/10.1002/dac.1296
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- HMAC-based Extract-and-Expand Key Derivation Function (HKDF)2010
- Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networksComputer Standards & Interfaces, 2009
- Distinguishing and Second-Preimage Attacks on CBC-Like MACsLecture Notes in Computer Science, 2009
- Recommendation for applications using approved hash algorithmsPublished by National Institute of Standards and Technology (NIST) ,2009
- Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MACWireless Communications and Mobile Computing, 2008
- Key-Recovery Attacks on Universal Hash Function Based MAC AlgorithmsLecture Notes in Computer Science, 2008
- Synchronization and beaconing in IEEE 802.11s mesh networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Impact of Denial of Service Attacks on Ad Hoc NetworksIEEE/ACM Transactions on Networking, 2008
- Jamming ACK Attack to Wireless Networks and a Mitigation ApproachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Anomaly detection of the NAV attack in MAC layer under non-time and time-constrained environmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006